Windows
Analysis Report
random.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- random.exe (PID: 5560 cmdline:
"C:\Users\ user\Deskt op\random. exe" MD5: 4283B9EBEDC388ABEAAFA9CEA78C1B70) - conhost.exe (PID: 6188 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - random.exe (PID: 528 cmdline:
"C:\Users\ user\Deskt op\random. exe" MD5: 4283B9EBEDC388ABEAAFA9CEA78C1B70) - WerFault.exe (PID: 652 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 560 -s 916 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["truculengisau.biz", "grandiouseziu.biz", "punishzement.biz", "spookycappy.biz", "marketlumpe.biz", "nuttyshopr.biz", "owerinternal.sbs", "fraggielek.biz", "littlenotii.biz"], "Build id": "FATE99--test"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:03.859561+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49704 | 104.102.49.254 | 443 | TCP |
2025-01-14T09:53:05.281057+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49705 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:06.160960+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49707 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:07.279472+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49710 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:11.738872+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49715 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:12.936560+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49717 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:14.170083+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49719 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:15.387604+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49722 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:18.968626+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49742 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:05.682426+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:06.622871+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49707 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:19.437834+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49742 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:05.682426+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:06.622871+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49707 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:03.087067+0100 | 2059133 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 50853 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:03.099666+0100 | 2059135 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 64008 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:03.111488+0100 | 2059137 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 60449 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:03.124676+0100 | 2059141 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 54863 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:03.140967+0100 | 2059143 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49163 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:03.072390+0100 | 2059163 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 56073 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:03.153320+0100 | 2059145 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 61840 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:03.168634+0100 | 2059151 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 57855 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:03.179520+0100 | 2059153 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 62050 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:14.625111+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49719 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:15.391858+0100 | 2843864 | 1 | A Network Trojan was detected | 192.168.2.5 | 49722 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:04.369005+0100 | 2858666 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49704 | 104.102.49.254 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 3_2_004182C0 | |
Source: | Code function: | 3_2_00415D15 | |
Source: | Code function: | 3_2_00418404 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 3_2_0042D420 | |
Source: | Code function: | 3_2_00408740 | |
Source: | Code function: | 3_2_00427A50 | |
Source: | Code function: | 3_2_0040BA29 | |
Source: | Code function: | 3_2_0040CB44 | |
Source: | Code function: | 3_2_00423E44 | |
Source: | Code function: | 3_2_0042E002 | |
Source: | Code function: | 3_2_0042E002 | |
Source: | Code function: | 3_2_004161DF | |
Source: | Code function: | 3_2_004251E8 | |
Source: | Code function: | 3_2_004082A0 | |
Source: | Code function: | 3_2_00440310 | |
Source: | Code function: | 3_2_004273A0 | |
Source: | Code function: | 3_2_004273A0 | |
Source: | Code function: | 3_2_004273A0 | |
Source: | Code function: | 3_2_00417451 | |
Source: | Code function: | 3_2_00407400 | |
Source: | Code function: | 3_2_00407400 | |
Source: | Code function: | 3_2_0043C410 | |
Source: | Code function: | 3_2_0043C410 | |
Source: | Code function: | 3_2_0042B430 | |
Source: | Code function: | 3_2_0042E5C2 | |
Source: | Code function: | 3_2_004165EE | |
Source: | Code function: | 3_2_00415590 | |
Source: | Code function: | 3_2_004095A0 | |
Source: | Code function: | 3_2_0041F710 | |
Source: | Code function: | 3_2_0041F710 | |
Source: | Code function: | 3_2_004427E0 | |
Source: | Code function: | 3_2_0042E7EB | |
Source: | Code function: | 3_2_0042F799 | |
Source: | Code function: | 3_2_00429871 | |
Source: | Code function: | 3_2_0042A810 | |
Source: | Code function: | 3_2_004288BA | |
Source: | Code function: | 3_2_00402940 | |
Source: | Code function: | 3_2_0040A910 | |
Source: | Code function: | 3_2_00426A00 | |
Source: | Code function: | 3_2_00438AF0 | |
Source: | Code function: | 3_2_0041AA90 | |
Source: | Code function: | 3_2_0041AA90 | |
Source: | Code function: | 3_2_0043EB00 | |
Source: | Code function: | 3_2_00420B10 | |
Source: | Code function: | 3_2_0041DC40 | |
Source: | Code function: | 3_2_00415C25 | |
Source: | Code function: | 3_2_00408CD0 | |
Source: | Code function: | 3_2_00426D70 | |
Source: | Code function: | 3_2_0042DD30 | |
Source: | Code function: | 3_2_00415E42 | |
Source: | Code function: | 3_2_00413E50 | |
Source: | Code function: | 3_2_0040DE72 | |
Source: | Code function: | 3_2_00425E00 | |
Source: | Code function: | 3_2_00425E00 | |
Source: | Code function: | 3_2_0043EE10 | |
Source: | Code function: | 3_2_00408EB0 | |
Source: | Code function: | 3_2_0041DEB0 | |
Source: | Code function: | 3_2_0040DFEA | |
Source: | Code function: | 3_2_0042DFAF |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 3_2_004363E0 |
Source: | Code function: | 3_2_004363E0 |
Source: | Code function: | 3_2_00436590 |
Source: | Code function: | 3_2_00420440 | |
Source: | Code function: | 3_2_00410446 | |
Source: | Code function: | 3_2_00442460 | |
Source: | Code function: | 3_2_0040D690 | |
Source: | Code function: | 3_2_00408740 | |
Source: | Code function: | 3_2_0043B7B0 | |
Source: | Code function: | 3_2_00415975 | |
Source: | Code function: | 3_2_00427A50 | |
Source: | Code function: | 3_2_00440A0D | |
Source: | Code function: | 3_2_00442DE0 | |
Source: | Code function: | 3_2_00423E44 | |
Source: | Code function: | 3_2_0040AE60 | |
Source: | Code function: | 3_2_0042DEE5 | |
Source: | Code function: | 3_2_00430050 | |
Source: | Code function: | 3_2_00411078 | |
Source: | Code function: | 3_2_004270D0 | |
Source: | Code function: | 3_2_00436140 | |
Source: | Code function: | 3_2_0043912C | |
Source: | Code function: | 3_2_004091C0 | |
Source: | Code function: | 3_2_004161DF | |
Source: | Code function: | 3_2_004311E6 | |
Source: | Code function: | 3_2_00432188 | |
Source: | Code function: | 3_2_00406190 | |
Source: | Code function: | 3_2_0042F195 | |
Source: | Code function: | 3_2_004421B0 | |
Source: | Code function: | 3_2_0041E250 | |
Source: | Code function: | 3_2_0041B200 | |
Source: | Code function: | 3_2_004042D0 | |
Source: | Code function: | 3_2_004082A0 | |
Source: | Code function: | 3_2_004412B1 | |
Source: | Code function: | 3_2_0041C370 | |
Source: | Code function: | 3_2_004273A0 | |
Source: | Code function: | 3_2_00417451 | |
Source: | Code function: | 3_2_00419470 | |
Source: | Code function: | 3_2_00407400 | |
Source: | Code function: | 3_2_0043C410 | |
Source: | Code function: | 3_2_0040E4B0 | |
Source: | Code function: | 3_2_0041A574 | |
Source: | Code function: | 3_2_004245C0 | |
Source: | Code function: | 3_2_004165EE | |
Source: | Code function: | 3_2_00415590 | |
Source: | Code function: | 3_2_004095A0 | |
Source: | Code function: | 3_2_00406620 | |
Source: | Code function: | 3_2_00418690 | |
Source: | Code function: | 3_2_0043974A | |
Source: | Code function: | 3_2_00419710 | |
Source: | Code function: | 3_2_0041F710 | |
Source: | Code function: | 3_2_0041C7D0 | |
Source: | Code function: | 3_2_004427E0 | |
Source: | Code function: | 3_2_0042A810 | |
Source: | Code function: | 3_2_00433810 | |
Source: | Code function: | 3_2_004058E0 | |
Source: | Code function: | 3_2_0042D893 | |
Source: | Code function: | 3_2_004148B0 | |
Source: | Code function: | 3_2_004288BA | |
Source: | Code function: | 3_2_0040A910 | |
Source: | Code function: | 3_2_00441910 | |
Source: | Code function: | 3_2_00403920 | |
Source: | Code function: | 3_2_00441A56 | |
Source: | Code function: | 3_2_0041BAD0 | |
Source: | Code function: | 3_2_00433AD0 | |
Source: | Code function: | 3_2_00431A88 | |
Source: | Code function: | 3_2_00441A94 | |
Source: | Code function: | 3_2_0041AA90 | |
Source: | Code function: | 3_2_00442A90 | |
Source: | Code function: | 3_2_0041CAA0 | |
Source: | Code function: | 3_2_0043CAA7 | |
Source: | Code function: | 3_2_00441B40 | |
Source: | Code function: | 3_2_00420B10 | |
Source: | Code function: | 3_2_00402B20 | |
Source: | Code function: | 3_2_00411B20 | |
Source: | Code function: | 3_2_0042ABC0 | |
Source: | Code function: | 3_2_00441BD0 | |
Source: | Code function: | 3_2_0043AC40 | |
Source: | Code function: | 3_2_00441C60 | |
Source: | Code function: | 3_2_00404C00 | |
Source: | Code function: | 3_2_0042ECD0 | |
Source: | Code function: | 3_2_00439CD8 | |
Source: | Code function: | 3_2_00440CD8 | |
Source: | Code function: | 3_2_00414C9C | |
Source: | Code function: | 3_2_0042CCA0 | |
Source: | Code function: | 3_2_00426D70 | |
Source: | Code function: | 3_2_00428D76 | |
Source: | Code function: | 3_2_00422D17 | |
Source: | Code function: | 3_2_00405DC0 | |
Source: | Code function: | 3_2_00415E42 | |
Source: | Code function: | 3_2_00413E50 | |
Source: | Code function: | 3_2_0041BE00 | |
Source: | Code function: | 3_2_00402EF0 | |
Source: | Code function: | 3_2_0043EE80 | |
Source: | Code function: | 3_2_0043AEA0 | |
Source: | Code function: | 3_2_00427F8D |
Source: | Code function: | ||
Source: | Code function: |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 3_2_0043B7B0 |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Code function: | 3_2_0043A6FE | |
Source: | Code function: | 3_2_00441864 | |
Source: | Code function: | 3_2_00445A1C |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 3_2_004402D0 |
Source: | Code function: | 0_2_026E7E85 | |
Source: | Code function: | 0_2_026E8002 |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_026E7E85 |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 23 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 231 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 23 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 41 Data from Local System | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | 2 Clipboard Data | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
68% | Virustotal | Browse | ||
71% | ReversingLabs | ByteCode-MSIL.Trojan.LummaStealer | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
aleksandr-block.com | 188.114.97.3 | true | false | high | |
steamcommunity.com | 104.102.49.254 | true | false | high | |
littlenotii.biz | unknown | unknown | true | unknown | |
fraggielek.biz | unknown | unknown | true | unknown | |
nuttyshopr.biz | unknown | unknown | true | unknown | |
grandiouseziu.biz | unknown | unknown | true | unknown | |
marketlumpe.biz | unknown | unknown | true | unknown | |
spookycappy.biz | unknown | unknown | true | unknown | |
owerinternal.sbs | unknown | unknown | true | unknown | |
truculengisau.biz | unknown | unknown | true | unknown | |
punishzement.biz | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.114.97.3 | aleksandr-block.com | European Union | 13335 | CLOUDFLARENETUS | false | |
104.102.49.254 | steamcommunity.com | United States | 16625 | AKAMAI-ASUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1590579 |
Start date and time: | 2025-01-14 09:52:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 55s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | random.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@5/5@11/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.190.160.20, 13.107.246.45, 4.245.163.56
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, 7.4.8.4.4.3.1.4.0.0.0.0.0.0.0.0.0.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
03:53:02 | API Interceptor | |
03:53:17 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
188.114.97.3 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
104.102.49.254 | Get hash | malicious | Socks5Systemz | Browse |
| |
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
aleksandr-block.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
steamcommunity.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
AKAMAI-ASUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | DBatLoader | Browse |
| ||
Get hash | malicious | DBatLoader | Browse |
| ||
Get hash | malicious | DBatLoader | Browse |
| ||
Get hash | malicious | DBatLoader | Browse |
| ||
Get hash | malicious | DBatLoader | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_random.exe_babc603bc4a9b171243db2249cd3d2b3a1128e8_91086e6b_e5f21fce-8345-4eb4-9327-b216b1ca3053\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8900778236915619 |
Encrypted: | false |
SSDEEP: | 96:2aFtYAO2bTX/s2tOujTOAqyS3QXIDcQlc6VcEdcw31+BHUHZ0ownOgHkEwH3dEFw:131pbTX/WA0LR3kauGzuiFxZ24IO8s |
MD5: | 9D89F025FA9B294C7C91921252B6A913 |
SHA1: | 0584A3EFB62D695ABE34AA289DD4F240E751B26C |
SHA-256: | B5E690DE0B5D245C6BBE10B0E264654817727FBC4D73D39056C3228728A9AEF9 |
SHA-512: | 2FBB397D823F4EAB66132AFC0083224B190A00C1755AAF83B74823777F843F7D96CE7CEE19B6A9F9A4555645C73AEBECB4B8EBBF1FFCC49F44004A4A1F7C33DB |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8382 |
Entropy (8bit): | 3.6899733609476795 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJEf6Cb6YEILSUOuegmfxxVJ5prr89b+GsfekKm:R6lXJ86A6YEkSUO/gmfxxVJo+lfr |
MD5: | 264B601CA9D8CDB16827FC2CA2ABA32D |
SHA1: | A62DC226F3C874EDFD2083BBF2FDC17AE1334C4A |
SHA-256: | 492FE7C2BAEC92204853BAB57642A6931C13606BA0C3C8835B874DD215F5C92E |
SHA-512: | 2AB4FD6F8460B8A55E19B1477D3F7885C73D5C49A59E99203C23697838EAB3B62510ECF5B201EE040BCA48FC43F8EA7D4BD0B6745DFED8A0893FFB31268D2270 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4750 |
Entropy (8bit): | 4.444282186817806 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsHJg77aI9/qrRWpW8VYeYm8M4JQdxPcf6F/+q8vUdxPcfcl0QPjrd:uIjfpI75qrA7VyJhfUKFfBQPjrd |
MD5: | 4414A6D6C8918EEAABE957B49D4A9561 |
SHA1: | F0E6C98F9F05B079C29CF64C4319B6E4FE547CD0 |
SHA-256: | E6A9943E1F7522FCF16B29D7686BF59DF4E65AD3214CBF729D12150C6CCA4333 |
SHA-512: | 5EA093734AF7658233345278D333230BB7854E0C3CA06F8CDDA4FBB9C75BD7DB48F37E2034ADF75662178640E0815DDFFECB0CB75D3744FD4EAB062FB06E7B71 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 154680 |
Entropy (8bit): | 3.7235125247985144 |
Encrypted: | false |
SSDEEP: | 1536:S2CspN4uE2aO2LTgFrOaoAf8tTDW3CD0quBojRmA:Sh64uEq2LTgFrwPW+0qm |
MD5: | 3E4DA025691C678B7CCABF7F8B029661 |
SHA1: | 419AFE7CD52322463D81D0CE5DDA579AE908E27E |
SHA-256: | E8780C3C61F98B365A19B1FD6B0143EE22680DDDA5CFC7C3D07F738617A739EA |
SHA-512: | DD1FCB97A4367CC47C5565F2A93AE0228197F0199FFFB0B70382F7DC0198F752BDEFFBC931BE897E07D5D21BB4A6B5594745522BDC435AD00E41CD83314E87FF |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.422193860070036 |
Encrypted: | false |
SSDEEP: | 6144:NSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnN50uhiTw1:0vloTMW+EZMM6DFyX03w |
MD5: | AAC50C6DF214D352D2579DF17662DBFC |
SHA1: | DF578E004E2FCD4F3CC2783D4F3988B959A1C160 |
SHA-256: | E130AB2DB1799205F711EC0C9D7894EF9B527CBD73F3C609ACEC96ABA7D51EEE |
SHA-512: | 20A4673B553DD8349FB3F32B54E8A05C2A919C5E1CBE8BC3EC7F84EAA12A939619E3A1C718E0168933120E5BF111967E604271199CE103FFB49EC700EF39EEE0 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.966130692507315 |
TrID: |
|
File name: | random.exe |
File size: | 340'480 bytes |
MD5: | 4283b9ebedc388abeaafa9cea78c1b70 |
SHA1: | 30efae5a5508741d0f537ff9b8bbc04b7be1c30f |
SHA256: | d5a861959e92c8a53a516c7438448396e7e433866488b01eba69354897ed5417 |
SHA512: | bdc04f8c21f6f2025b946efbbc102d540e2041c755184061c043160bfca92b5368596a289dc6cd6e89b611c037ee013e5ab7ed4dce69cc39290101d173f72c2d |
SSDEEP: | 6144:9WwfM7ZFvHHTG/nGo7P6F7zvgpkKqkKeplhz+hvHYuvErztWV4+4X:9z0D/TGfl7PGvgpkdkKe3h6Yust8e |
TLSH: | 4C741251AF978E39DC3FAA3D94B20A41113057E0AB375E1B7A8C104E5BD7D4B1E22B78 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..D..........>b... ........@.. .............................. [....`................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x40623e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x8ED8AEEC [Mon Dec 11 00:33:48 2045 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x61f0 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x8000 | 0x3f0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xa000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x61ae | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x4244 | 0x4400 | ba0e11db73079c2ee285644807363f1e | False | 0.49954044117647056 | data | 5.843117927150538 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x8000 | 0x3f0 | 0x400 | 665e507479d17a545bb95ee06391cb4d | False | 0.4482421875 | data | 3.349717922494151 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xa000 | 0xc | 0x200 | 6825b36b69c17af67c7cc64afc932607 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.bss | 0xc000 | 0x4e400 | 0x4e400 | 7c0c6e9fa3456dcc01bb1f2c0f1a35fb | False | 1.0003307208466454 | data | 7.999493104822926 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x8058 | 0x398 | OpenPGP Secret Key | English | United States | 0.45760869565217394 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-14T09:53:03.072390+0100 | 2059163 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (owerinternal .sbs) | 1 | 192.168.2.5 | 56073 | 1.1.1.1 | 53 | UDP |
2025-01-14T09:53:03.087067+0100 | 2059133 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fraggielek .biz) | 1 | 192.168.2.5 | 50853 | 1.1.1.1 | 53 | UDP |
2025-01-14T09:53:03.099666+0100 | 2059135 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grandiouseziu .biz) | 1 | 192.168.2.5 | 64008 | 1.1.1.1 | 53 | UDP |
2025-01-14T09:53:03.111488+0100 | 2059137 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (littlenotii .biz) | 1 | 192.168.2.5 | 60449 | 1.1.1.1 | 53 | UDP |
2025-01-14T09:53:03.124676+0100 | 2059141 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (marketlumpe .biz) | 1 | 192.168.2.5 | 54863 | 1.1.1.1 | 53 | UDP |
2025-01-14T09:53:03.140967+0100 | 2059143 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nuttyshopr .biz) | 1 | 192.168.2.5 | 49163 | 1.1.1.1 | 53 | UDP |
2025-01-14T09:53:03.153320+0100 | 2059145 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (punishzement .biz) | 1 | 192.168.2.5 | 61840 | 1.1.1.1 | 53 | UDP |
2025-01-14T09:53:03.168634+0100 | 2059151 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (spookycappy .biz) | 1 | 192.168.2.5 | 57855 | 1.1.1.1 | 53 | UDP |
2025-01-14T09:53:03.179520+0100 | 2059153 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (truculengisau .biz) | 1 | 192.168.2.5 | 62050 | 1.1.1.1 | 53 | UDP |
2025-01-14T09:53:03.859561+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49704 | 104.102.49.254 | 443 | TCP |
2025-01-14T09:53:04.369005+0100 | 2858666 | ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup | 1 | 192.168.2.5 | 49704 | 104.102.49.254 | 443 | TCP |
2025-01-14T09:53:05.281057+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49705 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:05.682426+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49705 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:05.682426+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49705 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:06.160960+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49707 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:06.622871+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49707 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:06.622871+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49707 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:07.279472+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49710 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:11.738872+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49715 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:12.936560+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49717 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:14.170083+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49719 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:14.625111+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49719 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:15.387604+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49722 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:15.391858+0100 | 2843864 | ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 | 1 | 192.168.2.5 | 49722 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:18.968626+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-14T09:53:19.437834+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49742 | 188.114.97.3 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 14, 2025 09:53:03.203972101 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:03.204011917 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:03.204077959 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:03.207330942 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:03.207354069 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:03.859468937 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:03.859560966 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:03.863610983 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:03.863620043 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:03.863979101 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:03.916512012 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:03.921314001 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:03.967330933 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:04.369034052 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:04.369059086 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:04.369065046 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:04.369076967 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:04.369081974 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:04.369263887 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:04.369278908 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:04.369332075 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:04.464071035 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:04.464095116 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:04.464308977 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:04.464335918 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:04.464481115 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:04.469249010 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:04.469341040 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:04.469424963 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:04.469424963 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:04.670404911 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:04.670433044 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:04.670466900 CET | 49704 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 14, 2025 09:53:04.670473099 CET | 443 | 49704 | 104.102.49.254 | 192.168.2.5 |
Jan 14, 2025 09:53:04.783581972 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:04.783696890 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:04.783787012 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:04.784673929 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:04.784712076 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:05.280961990 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:05.281056881 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:05.284787893 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:05.284817934 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:05.285187960 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:05.286586046 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:05.286640882 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:05.286683083 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:05.682456017 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:05.682554960 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:05.682621956 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:05.683832884 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:05.683862925 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:05.691485882 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:05.691531897 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:05.691840887 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:05.692152023 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:05.692168951 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.160876036 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.160959959 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.162728071 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.162739038 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.162936926 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.164067984 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.164083958 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.164139032 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.622865915 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.622950077 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.622998953 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.623032093 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.623042107 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.623059988 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.623068094 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.623126984 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.623132944 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.623749971 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.623783112 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.623806953 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.623815060 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.623908997 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.629424095 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.682177067 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.682199001 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.711850882 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.711937904 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.712109089 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.712132931 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.712151051 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.712229013 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.712506056 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.712524891 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.712531090 CET | 49707 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.712536097 CET | 443 | 49707 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.804819107 CET | 49710 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.804868937 CET | 443 | 49710 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:06.804984093 CET | 49710 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.805320978 CET | 49710 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:06.805361032 CET | 443 | 49710 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:07.279370070 CET | 443 | 49710 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:07.279472113 CET | 49710 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:07.326288939 CET | 49710 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:07.326327085 CET | 443 | 49710 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:07.326611042 CET | 443 | 49710 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:07.385235071 CET | 49710 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:07.412925005 CET | 49710 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:07.413409948 CET | 49710 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:07.413469076 CET | 443 | 49710 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:11.229353905 CET | 443 | 49710 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:11.229556084 CET | 443 | 49710 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:11.229629040 CET | 49710 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:11.229733944 CET | 49710 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:11.229754925 CET | 443 | 49710 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:11.254595995 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:11.254693031 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:11.254784107 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:11.255106926 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:11.255141020 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:11.738713980 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:11.738872051 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:11.740411043 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:11.740422964 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:11.740664005 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:11.748838902 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:11.749028921 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:11.749073982 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:11.749136925 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:11.749142885 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:12.388977051 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:12.389077902 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:12.389153957 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:12.389307022 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:12.389353037 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:12.460299969 CET | 49717 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:12.460350990 CET | 443 | 49717 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:12.460428953 CET | 49717 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:12.460783958 CET | 49717 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:12.460797071 CET | 443 | 49717 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:12.936389923 CET | 443 | 49717 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:12.936559916 CET | 49717 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:12.945317030 CET | 49717 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:12.945341110 CET | 443 | 49717 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:12.945652008 CET | 443 | 49717 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:12.946876049 CET | 49717 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:12.947067976 CET | 49717 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:12.947108984 CET | 443 | 49717 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:12.947180986 CET | 49717 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:12.947196007 CET | 443 | 49717 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:13.601280928 CET | 443 | 49717 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:13.601378918 CET | 443 | 49717 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:13.601488113 CET | 49717 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:13.601742029 CET | 49717 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:13.601785898 CET | 443 | 49717 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:13.685425043 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:13.685471058 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:13.685569048 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:13.685946941 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:13.685964108 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:14.169744968 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:14.170083046 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:14.171727896 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:14.171740055 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:14.171976089 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:14.173403025 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:14.173496962 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:14.173501968 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:14.625123024 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:14.625364065 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:14.625446081 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:14.625576973 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:14.625616074 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:14.898924112 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:14.898979902 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:14.899096966 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:14.899450064 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:14.899466038 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.387518883 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.387603998 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.389019966 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.389029026 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.389265060 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.390537024 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.391254902 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.391288996 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.391381025 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.391408920 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.391511917 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.391534090 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.391675949 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.391714096 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.391849041 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.391876936 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.392021894 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.392060041 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.392070055 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.392083883 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.392245054 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.392277002 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.392297983 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.392446995 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.392484903 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.401693106 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.401918888 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.401962042 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.401982069 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.401987076 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.402014971 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:15.402036905 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:15.402112961 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:18.473360062 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:18.473612070 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:18.473773003 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:18.474039078 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:18.474057913 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:18.479507923 CET | 49742 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:18.479558945 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:18.479654074 CET | 49742 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:18.480030060 CET | 49742 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:18.480047941 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:18.968514919 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:18.968626022 CET | 49742 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:18.969955921 CET | 49742 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:18.969965935 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:18.970201969 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:18.971441984 CET | 49742 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:18.971473932 CET | 49742 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:18.971510887 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:19.437836885 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:19.437937975 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:19.437994003 CET | 49742 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:19.438220978 CET | 49742 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:19.438249111 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:19.438266993 CET | 49742 | 443 | 192.168.2.5 | 188.114.97.3 |
Jan 14, 2025 09:53:19.438276052 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.5 |
Jan 14, 2025 09:53:45.377474070 CET | 53448 | 53 | 192.168.2.5 | 162.159.36.2 |
Jan 14, 2025 09:53:45.382297039 CET | 53 | 53448 | 162.159.36.2 | 192.168.2.5 |
Jan 14, 2025 09:53:45.382370949 CET | 53448 | 53 | 192.168.2.5 | 162.159.36.2 |
Jan 14, 2025 09:53:45.387422085 CET | 53 | 53448 | 162.159.36.2 | 192.168.2.5 |
Jan 14, 2025 09:53:45.846771002 CET | 53448 | 53 | 192.168.2.5 | 162.159.36.2 |
Jan 14, 2025 09:53:45.851963043 CET | 53 | 53448 | 162.159.36.2 | 192.168.2.5 |
Jan 14, 2025 09:53:45.852076054 CET | 53448 | 53 | 192.168.2.5 | 162.159.36.2 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 14, 2025 09:53:03.072390079 CET | 56073 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 09:53:03.081022978 CET | 53 | 56073 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 09:53:03.087066889 CET | 50853 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 09:53:03.097950935 CET | 53 | 50853 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 09:53:03.099666119 CET | 64008 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 09:53:03.109841108 CET | 53 | 64008 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 09:53:03.111488104 CET | 60449 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 09:53:03.120172024 CET | 53 | 60449 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 09:53:03.124675989 CET | 54863 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 09:53:03.133766890 CET | 53 | 54863 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 09:53:03.140966892 CET | 49163 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 09:53:03.149560928 CET | 53 | 49163 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 09:53:03.153320074 CET | 61840 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 09:53:03.163399935 CET | 53 | 61840 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 09:53:03.168633938 CET | 57855 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 09:53:03.177815914 CET | 53 | 57855 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 09:53:03.179519892 CET | 62050 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 09:53:03.188396931 CET | 53 | 62050 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 09:53:03.189961910 CET | 57693 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 09:53:03.196672916 CET | 53 | 57693 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 09:53:04.677268028 CET | 55260 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 14, 2025 09:53:04.684878111 CET | 53 | 55260 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 09:53:45.376672983 CET | 53 | 59122 | 162.159.36.2 | 192.168.2.5 |
Jan 14, 2025 09:53:47.106815100 CET | 53 | 55468 | 1.1.1.1 | 192.168.2.5 |
Jan 14, 2025 09:53:47.106838942 CET | 53 | 55468 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 14, 2025 09:53:03.072390079 CET | 192.168.2.5 | 1.1.1.1 | 0x13c3 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.087066889 CET | 192.168.2.5 | 1.1.1.1 | 0x85af | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.099666119 CET | 192.168.2.5 | 1.1.1.1 | 0x6a1 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.111488104 CET | 192.168.2.5 | 1.1.1.1 | 0x3b2f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.124675989 CET | 192.168.2.5 | 1.1.1.1 | 0x5751 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.140966892 CET | 192.168.2.5 | 1.1.1.1 | 0x4dd7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.153320074 CET | 192.168.2.5 | 1.1.1.1 | 0x5233 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.168633938 CET | 192.168.2.5 | 1.1.1.1 | 0x821c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.179519892 CET | 192.168.2.5 | 1.1.1.1 | 0xb242 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.189961910 CET | 192.168.2.5 | 1.1.1.1 | 0x7c67 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:04.677268028 CET | 192.168.2.5 | 1.1.1.1 | 0x9a0f | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 14, 2025 09:53:03.081022978 CET | 1.1.1.1 | 192.168.2.5 | 0x13c3 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.097950935 CET | 1.1.1.1 | 192.168.2.5 | 0x85af | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.109841108 CET | 1.1.1.1 | 192.168.2.5 | 0x6a1 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.120172024 CET | 1.1.1.1 | 192.168.2.5 | 0x3b2f | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.133766890 CET | 1.1.1.1 | 192.168.2.5 | 0x5751 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.149560928 CET | 1.1.1.1 | 192.168.2.5 | 0x4dd7 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.163399935 CET | 1.1.1.1 | 192.168.2.5 | 0x5233 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.177815914 CET | 1.1.1.1 | 192.168.2.5 | 0x821c | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.188396931 CET | 1.1.1.1 | 192.168.2.5 | 0xb242 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 14, 2025 09:53:03.196672916 CET | 1.1.1.1 | 192.168.2.5 | 0x7c67 | No error (0) | 104.102.49.254 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 09:53:04.684878111 CET | 1.1.1.1 | 192.168.2.5 | 0x9a0f | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Jan 14, 2025 09:53:04.684878111 CET | 1.1.1.1 | 192.168.2.5 | 0x9a0f | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49704 | 104.102.49.254 | 443 | 528 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 08:53:03 UTC | 219 | OUT | |
2025-01-14 08:53:04 UTC | 1905 | IN | |
2025-01-14 08:53:04 UTC | 14479 | IN | |
2025-01-14 08:53:04 UTC | 16384 | IN | |
2025-01-14 08:53:04 UTC | 3768 | IN | |
2025-01-14 08:53:04 UTC | 510 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49705 | 188.114.97.3 | 443 | 528 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 08:53:05 UTC | 266 | OUT | |
2025-01-14 08:53:05 UTC | 8 | OUT | |
2025-01-14 08:53:05 UTC | 1125 | IN | |
2025-01-14 08:53:05 UTC | 7 | IN | |
2025-01-14 08:53:05 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49707 | 188.114.97.3 | 443 | 528 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 08:53:06 UTC | 267 | OUT | |
2025-01-14 08:53:06 UTC | 46 | OUT | |
2025-01-14 08:53:06 UTC | 1127 | IN | |
2025-01-14 08:53:06 UTC | 242 | IN | |
2025-01-14 08:53:06 UTC | 899 | IN | |
2025-01-14 08:53:06 UTC | 1369 | IN | |
2025-01-14 08:53:06 UTC | 1369 | IN | |
2025-01-14 08:53:06 UTC | 1369 | IN | |
2025-01-14 08:53:06 UTC | 1369 | IN | |
2025-01-14 08:53:06 UTC | 1369 | IN | |
2025-01-14 08:53:06 UTC | 1369 | IN | |
2025-01-14 08:53:06 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49710 | 188.114.97.3 | 443 | 528 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 08:53:07 UTC | 280 | OUT | |
2025-01-14 08:53:07 UTC | 12804 | OUT | |
2025-01-14 08:53:11 UTC | 1142 | IN | |
2025-01-14 08:53:11 UTC | 20 | IN | |
2025-01-14 08:53:11 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49715 | 188.114.97.3 | 443 | 528 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 08:53:11 UTC | 284 | OUT | |
2025-01-14 08:53:11 UTC | 15070 | OUT | |
2025-01-14 08:53:12 UTC | 1128 | IN | |
2025-01-14 08:53:12 UTC | 20 | IN | |
2025-01-14 08:53:12 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49717 | 188.114.97.3 | 443 | 528 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 08:53:12 UTC | 279 | OUT | |
2025-01-14 08:53:12 UTC | 15331 | OUT | |
2025-01-14 08:53:12 UTC | 5199 | OUT | |
2025-01-14 08:53:13 UTC | 1129 | IN | |
2025-01-14 08:53:13 UTC | 20 | IN | |
2025-01-14 08:53:13 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49719 | 188.114.97.3 | 443 | 528 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 08:53:14 UTC | 284 | OUT | |
2025-01-14 08:53:14 UTC | 1422 | OUT | |
2025-01-14 08:53:14 UTC | 1130 | IN | |
2025-01-14 08:53:14 UTC | 20 | IN | |
2025-01-14 08:53:14 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49722 | 188.114.97.3 | 443 | 528 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 08:53:15 UTC | 281 | OUT | |
2025-01-14 08:53:15 UTC | 15331 | OUT | |
2025-01-14 08:53:15 UTC | 15331 | OUT | |
2025-01-14 08:53:15 UTC | 15331 | OUT | |
2025-01-14 08:53:15 UTC | 15331 | OUT | |
2025-01-14 08:53:15 UTC | 15331 | OUT | |
2025-01-14 08:53:15 UTC | 15331 | OUT | |
2025-01-14 08:53:15 UTC | 15331 | OUT | |
2025-01-14 08:53:15 UTC | 15331 | OUT | |
2025-01-14 08:53:15 UTC | 15331 | OUT | |
2025-01-14 08:53:15 UTC | 15331 | OUT | |
2025-01-14 08:53:18 UTC | 1131 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.5 | 49742 | 188.114.97.3 | 443 | 528 | C:\Users\user\Desktop\random.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-14 08:53:18 UTC | 267 | OUT | |
2025-01-14 08:53:18 UTC | 81 | OUT | |
2025-01-14 08:53:19 UTC | 1129 | IN | |
2025-01-14 08:53:19 UTC | 54 | IN | |
2025-01-14 08:53:19 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 03:53:02 |
Start date: | 14/01/2025 |
Path: | C:\Users\user\Desktop\random.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3d0000 |
File size: | 340'480 bytes |
MD5 hash: | 4283B9EBEDC388ABEAAFA9CEA78C1B70 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 03:53:02 |
Start date: | 14/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 03:53:02 |
Start date: | 14/01/2025 |
Path: | C:\Users\user\Desktop\random.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7e0000 |
File size: | 340'480 bytes |
MD5 hash: | 4283B9EBEDC388ABEAAFA9CEA78C1B70 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 6 |
Start time: | 03:53:02 |
Start date: | 14/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xac0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 12.7% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 100% |
Total number of Nodes: | 7 |
Total number of Limit Nodes: | 1 |
Graph
Function 026E7E85 Relevance: 40.5, APIs: 10, Strings: 13, Instructions: 294threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 026E8002 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 82threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D61C3B Relevance: 1.6, APIs: 1, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D61C3C Relevance: 1.6, APIs: 1, Instructions: 54memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D62A5F Relevance: 1.6, APIs: 1, Instructions: 51memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 65.4% |
Total number of Nodes: | 373 |
Total number of Limit Nodes: | 29 |
Graph
Function 0043B7B0 Relevance: 23.6, APIs: 11, Strings: 2, Instructions: 851memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408740 Relevance: 10.7, APIs: 5, Strings: 1, Instructions: 228threadCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420440 Relevance: 6.7, Strings: 5, Instructions: 435COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040AE60 Relevance: 5.5, Strings: 4, Instructions: 489COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CB44 Relevance: 3.0, APIs: 2, Instructions: 30COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00410446 Relevance: 2.4, APIs: 1, Instructions: 941COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427A50 Relevance: 1.7, Strings: 1, Instructions: 403COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004402D0 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F195 Relevance: 1.4, Strings: 1, Instructions: 190COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040BA29 Relevance: 1.3, Strings: 1, Instructions: 84COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415975 Relevance: .5, Instructions: 524COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442460 Relevance: .3, Instructions: 317COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442DE0 Relevance: .3, Instructions: 296COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440A0D Relevance: .2, Instructions: 210COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D420 Relevance: .1, Instructions: 122COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004406A2 Relevance: 3.0, APIs: 2, Instructions: 14COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432D44 Relevance: 1.6, APIs: 1, Instructions: 94COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F596 Relevance: 1.6, APIs: 1, Instructions: 75COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F586 Relevance: 1.6, APIs: 1, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AA74 Relevance: 1.6, APIs: 1, Instructions: 55COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440260 Relevance: 1.5, APIs: 1, Instructions: 45memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004358EF Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432648 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E860 Relevance: 1.5, APIs: 1, Instructions: 22memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E840 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00411B20 Relevance: 150.7, APIs: 4, Strings: 81, Instructions: 1908COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041CAA0 Relevance: 83.7, Strings: 66, Instructions: 1193COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00422D17 Relevance: 71.6, Strings: 57, Instructions: 394COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00425E00 Relevance: 34.2, Strings: 27, Instructions: 430COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004251E8 Relevance: 34.2, Strings: 27, Instructions: 426COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AEA0 Relevance: 22.9, Strings: 18, Instructions: 366COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430050 Relevance: 14.6, Strings: 11, Instructions: 875COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EE80 Relevance: 8.1, Strings: 6, Instructions: 616COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417451 Relevance: 6.7, Strings: 5, Instructions: 462COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A910 Relevance: 6.7, Strings: 5, Instructions: 422COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004091C0 Relevance: 6.6, Strings: 5, Instructions: 382COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00420B10 Relevance: 5.5, Strings: 4, Instructions: 470COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042F799 Relevance: 5.4, Strings: 4, Instructions: 395COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408EB0 Relevance: 5.3, Strings: 4, Instructions: 299COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041AA90 Relevance: 4.4, Strings: 3, Instructions: 606COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427F8D Relevance: 4.2, Strings: 3, Instructions: 445COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004095A0 Relevance: 4.1, Strings: 3, Instructions: 375COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00419710 Relevance: 4.0, Strings: 3, Instructions: 239COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00419470 Relevance: 4.0, Strings: 3, Instructions: 230COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E5C2 Relevance: 3.9, Strings: 3, Instructions: 189COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00413E50 Relevance: 3.4, Strings: 2, Instructions: 884COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404C00 Relevance: 3.3, Strings: 2, Instructions: 792COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041E250 Relevance: 3.2, Strings: 2, Instructions: 677COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041F710 Relevance: 3.0, Strings: 2, Instructions: 527COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CCA0 Relevance: 3.0, Strings: 2, Instructions: 512COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042ABC0 Relevance: 3.0, Strings: 2, Instructions: 454COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B200 Relevance: 2.9, Strings: 2, Instructions: 440COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C410 Relevance: 2.8, Strings: 2, Instructions: 349COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004042D0 Relevance: 2.8, Strings: 2, Instructions: 329COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C370 Relevance: 2.8, Strings: 2, Instructions: 273COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433810 Relevance: 2.7, Strings: 2, Instructions: 239COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00436140 Relevance: 2.7, Strings: 2, Instructions: 234COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DFAF Relevance: 2.6, Strings: 2, Instructions: 124COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E7EB Relevance: 2.6, Strings: 2, Instructions: 108COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00411078 Relevance: 2.1, APIs: 1, Instructions: 560COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414C9C Relevance: 2.0, Strings: 1, Instructions: 784COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441910 Relevance: 1.9, Strings: 1, Instructions: 646COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043CAA7 Relevance: 1.9, Strings: 1, Instructions: 620COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441A56 Relevance: 1.8, Strings: 1, Instructions: 520COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441A94 Relevance: 1.7, Strings: 1, Instructions: 498COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441B40 Relevance: 1.7, Strings: 1, Instructions: 445COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BE00 Relevance: 1.7, Strings: 1, Instructions: 443COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441BD0 Relevance: 1.7, Strings: 1, Instructions: 410COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00441C60 Relevance: 1.7, Strings: 1, Instructions: 409COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A574 Relevance: 1.6, Strings: 1, Instructions: 324COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004273A0 Relevance: 1.6, Strings: 1, Instructions: 311COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004082A0 Relevance: 1.5, Strings: 1, Instructions: 288COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D893 Relevance: 1.5, Strings: 1, Instructions: 281COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DC0 Relevance: 1.5, Strings: 1, Instructions: 271COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004148B0 Relevance: 1.5, Strings: 1, Instructions: 263COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E002 Relevance: 1.4, Strings: 1, Instructions: 152COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004270D0 Relevance: 1.4, Strings: 1, Instructions: 151COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426A00 Relevance: 1.3, Strings: 1, Instructions: 11COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433AD0 Relevance: .8, Instructions: 767COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406620 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402EF0 Relevance: .7, Instructions: 664COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407400 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403920 Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040E4B0 Relevance: .4, Instructions: 450COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004058E0 Relevance: .4, Instructions: 413COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043974A Relevance: .4, Instructions: 401COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004288BA Relevance: .4, Instructions: 371COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415590 Relevance: .3, Instructions: 326COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428D76 Relevance: .3, Instructions: 319COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406190 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439CD8 Relevance: .3, Instructions: 297COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043912C Relevance: .3, Instructions: 293COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BAD0 Relevance: .3, Instructions: 290COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00442A90 Relevance: .3, Instructions: 289COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432188 Relevance: .3, Instructions: 280COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426D70 Relevance: .3, Instructions: 280COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004311E6 Relevance: .3, Instructions: 274COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00431A88 Relevance: .3, Instructions: 273COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C7D0 Relevance: .2, Instructions: 245COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004427E0 Relevance: .2, Instructions: 242COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DC40 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AC40 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004421B0 Relevance: .2, Instructions: 171COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402940 Relevance: .2, Instructions: 164COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004412B1 Relevance: .2, Instructions: 160COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429871 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408CD0 Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DFEA Relevance: .1, Instructions: 126COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DE72 Relevance: .1, Instructions: 120COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EB00 Relevance: .1, Instructions: 86COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415C25 Relevance: .1, Instructions: 80COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402B20 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440CD8 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438AF0 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042B430 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EE10 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DEB0 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440310 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|